* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Document
Survey
Document related concepts
IEEE 802.1aq wikipedia , lookup
TCP congestion control wikipedia , lookup
Distributed firewall wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Power over Ethernet wikipedia , lookup
Point-to-Point Protocol over Ethernet wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Communication protocol wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Transcript
CIT 524: Introduction to Computer Networks Mohammed A. Saleh http://ifm.ac.tz/staff/msaleh/CIT524.html 1 Important Information Lecturer name: Mr. Mohammed A. S. Find out about my contact details from my personal website http://ifm.ac.tz/staff/msaleh For any questions regarding the course, you can write me an email at any time. Will try to be prompt for response. If you need to see me in my office please book an appointment by writing me an email [email protected] All notes will be uploaded on the CIT 742 web page, http://ifm.ac.tz/staff/msaleh/CIT524.html A hardcopy will be submitted to the class representative 2 Basic Rules Try to attend ALL lectures Sign against your name on the register Try not to be late, if you have to be late, come in quietly. If you miss a class find out what was covered Material covered in lectures is examinable The course notes are not meant to be exhaustive, read the recommended books; Read critically, point out any errors in the lecture notes. 3 Required Readings Author Year Title Publisher Hermachandran L. 2003 Computer Communications Network Charulatha Tanenbaum A. S. 2005 Computer Networks Prentice-Hall Galo M. A. 2002 Computer Communications and Networking Technologies Pacific Grove Rowe S and Schuch 2005 Computer Networking Pearson 4 Recommended Readings Author Year Title Publisher Kurose J. F 2001 Computer Networking a top down approach Pearson Halsall 2005 Computer Networking and Internet McGraw-Hill Madhulika J. 2002 Computer Networks BPB 5 Method of Assessment Student will be assessed through CA (coursework) Two compulsory tests – Dates will be announced soon! Tutorials and Assignments – Must attend tutorials! Final examinations Coursework carries 40% Final Exams carries 60% 6 Network Protocols and Standards Protocols and standards are what make networks work together Protocols make it possible for the various components of a network to communicate with each other. Standards also make it possible for network components manufactured by different companies to work together 7 Understanding Protocols A protocol is a set of rules that enable effective communications to occur An example of an everyday protocol: making a phone call Computer networks depend upon many different types of protocols in order to work These protocols are very rigidly defined, and for good reason. Network cards must know how to talk to other network cards in order to exchange information Operating systems must know how to talk to network cards in order to send and receive data on the network Application programs must know how to talk to operating systems in order to know how to retrieve a file from a network server. 8 Cont … Protocols come in many different types: At the lowest level, protocols define exactly what type of electrical signal represents a one and what type of signal represents a zero At the highest level, protocols allow a computer user in the Tanzania to send an e-mail message to another computer user in Kenya Various protocols tend to be used together in matched sets called protocol suites. The two most popular protocol suites for networking are TCP/IP and IPX/SPX TCP/IP was originally developed for UNIX networks and is the protocol of the Internet IPX/SPX widely used by Novell, runs on Windows networks Ethernet, a low-level protocol that’s used with both TCP/IP and 9 IPX/SPX. Understanding Standards A standard is an agreed-upon definition of a protocol. In the early days each computer manufacturer developed its own networking protocols. What do you think resulted from this? Standards are industry-wide protocol definitions that are not tied to a particular manufacturer. 1. With standard protocols, you can mix and match equipment from different vendors Organizations involved in setting standards include: American National Standards Institute(ANSI):The official standards organization in the United States. ANSI is pronounced An-See. 10 Cont … 2. 3. 4. 5. Institute of Electrical and Electronics Engineers (IEEE): An international organization that publishes several key networking standards; in particular, the official standard for the Ethernet networking system (known officially as IEEE 802.3). IEEE is pronounced Eye-triple-E. International Organization for Standardization (ISO): A federation of more than 100 standards organizations from throughout the world. Internet Engineering Task Force(IETF):The organization responsible for the protocols that drive the Internet. World Wide Web Consortium(W3C):An international organization that handles the development of 11 standards for the World Wide Web. Cont … Web Sites for Major Standards Organization 12 OSI Reference Model The OSI model breaks the various aspects of a computer network into seven distinct layers Each successive layer envelops the layer beneath it, hiding its details from the levels above The OSI model is also like an onion in that if you start to peel it apart to have a look inside, you’re bound to shed a few tears. 13 Cont … 14 The Ethernet Protocol The first two layers of the OSI model deal with the physical structure of the network The most popular protocol in layer 1 and 2 is the Ethernet protocol The current incarnation of Ethernet is defined by the IEEE standard known as 802.3 It means by which network devices can send information from one device on a network to another Various flavors of Ethernet operate at different speeds and use different types of media The actual transmission speed of Ethernet is measured in millions of bits per second, or Mbps 15 Cont … Ethernet comes in three different speed versions: What is the network transmission speed? 10 Mbps, known as Standard Ethernet 100 Mbps, known as Fast Ethernet 1,000 Mbps, known as Gigabit Ethernet. Refers to the maximum speed that can be achieved over the network under ideal conditions In reality, the actual throughput of an Ethernet network rarely reaches this maximum speed. 16 Cont … 17 Standard Ethernet 1. Standard Ethernet is the original Ethernet It runs at 10 Mbps Fast Ethernet has pretty much replaced Standard Ethernet for most new networks It comes in four incarnations, depending on the type of cable used to string the network together: 10Base5 The original Ethernet cable was thick, heavy, and difficult to work with Only seen in museums today 18 Cont … 2. 10Base2 This thinner type of coaxial cable Became popular in the 1980s and lingered into the early 1990s Plenty of 10Base2 cable is still in use It’s rarely installed in new networks 10Base2 (like 10Base5) uses a bus topology 3. Wiring a 10Base2 network involves running cable from one computer to the next until all the computers are connected in a segment. 10BaseT Unshielded twisted-pair cable (also known as UTP) Became popular because it’s easier to install, lighter, more reliable, and offers more flexibility in how networks are designed 10BaseT networks use a star topology with hubs at the center of each star 19 Cont … Maximum length of 10BaseT cable is only 100 meters, hubs can be chained together to extend networks well beyond the 100meter limit. Has four pairs of wires that are twisted together through- out the entire span of the cable 4. uses only two of these wire pairs, so the unused pairs are spares. 10BaseFL Fiber-optic cables were originally supported at 10Mbps by the 10BaseFL standard Because fiber-optic versions of Ethernet now exist, 10BaseFL are rarely used. 20 Fast Ethernet 1. Refers to Ethernet that runs at 100 Mbps, which is ten times the speed of standard Ethernet It has three varieties: 100BaseT4 2. Allows transmission speeds of 100 Mbps over the same UTP cable as 10BaseT networks It uses all four pairs of wire in the cable 100BaseTX The most commonly used standard for office networks It transmits at 100 Mbps over just two pairs of a higher grade of UTP cable than the cable used by 10BaseT The higher- grade cable is referred to as Category 5 21 Cont … 3. 100BaseFX The fiber-optic version of Ethernet running at 100Mbps It’s commonly used as a network backbone a fiber backbone is often used to connect individual workgroup hubs to routers and servers. 22 Gigabit Ethernet Running at 1,000 Mbps, which is 100 times faster than the original 10 Mbps Ethernet Considerably more expensive than Fast Ethernet Used as the backbone for very large networks or to connect server computers to the network In some cases, Gigabit Ethernet is even used for desktop computers that require high-speed net- work connections. Gigabit Ethernet comes in two flavors: 23 Cont … 1. 1000BaseT: 2. Run on Category 5 UTP cable, but higher grades such as Category 5e or Category 6 are preferred because they’re more reliable 1000BaseLX Several varieties of fiber cable are used with Gigabit Ethernet, but the most popular is called 1000BaseLX. 24 TCP/IP Protocol Suite The protocol on which the Internet is built Not a single protocol but rather an entire suite of related protocols The TCP/IP suite is based on a four-layer model of networking that is similar to the seven-layer OSI model The lowest layer of the model, the Network Interface layer, corresponds to the OSI model’s Physical and Data Link layers 25 Cont … 26 1. Important Protocols IP IP, which stands for Internet Protocol It is a Network layer protocol that is responsible for delivering packets to network devices. It uses logical IP addresses to refer to individual devices rather than physical (MAC) addresses. A protocol called ARP (for Address Resolution Protocol) handles the task of converting IP addresses to MAC addresses. IP addresses consist of a network part and a host part, IP is a routable protocol As a result, IP can forward a packet to another network if the host is not on the current network An internet is a series of two or more connected TCP/IP 27 networks that can be reached by routing Cont … 2. TCP It stands for Transmission Control Protocol, is a connection- oriented Transport layer protocol It lets a device reliably send a packet to another device on the same network or on a different network It does so by establishing a connection with the receiving device and then sending the packets. ensures that each packet is delivered if at all possible If a packet doesn’t arrive, TCP resends the packet The connection is closed only after the packet has been successfully delivered or an unrecoverable error condition has occurred. 28 Cont … One key aspect of TCP is that it’s always used for oneto-one communications Many well-known Application layer protocols rely on TCP TCP allows a single network device to exchange data with another single network device TCP is not used to broadcast messages to multiple network recipients When a user running a Web browser requests a page, the browser uses HTTP to send a request via TCP to the Web server When the Web server receives the request, it uses HTTP to send the requested Web page back to the browser, again via TCP Other protocols include Telnet (for terminal emulation), FTP (for file exchange), and SMTP (for e- 29 Cont … 3. UDP The User Datagram Protocol (or UDP) is a connectionless Transport layer protocol It is used when the overhead of a connection isn’t required After UDP has placed a packet on the network (via the IP protocol), it forgets about it UDP doesn’t guarantee that the packet actually arrives at its destination Most applications that use UDP simply wait for any replies expected as a result of packets sent via UDP If a reply doesn’t arrive within a certain period of time, the application either sends the packet again or gives up. 30 Cont … The best-known Application layer protocol that uses UDP is DNS, the Domain Name System When an application needs to access a domain name such as www.wiley.com DNS sends a UDP packet to a DNS server to look up the domain When the server finds the domain, it returns the domain’s IP address in another UDP packet 31 The IPX/SPX Protocol Suite Novell originally developed the IPX/SPX suite in the 1980s for use with their NetWare server IPX/SPX also works with all Microsoft operating systems, and even with Unix and Linux. IPX stands for Internetwork Package Exchange. It’s a Network layer protocol that’s analogous to IP. SPX stands for Sequenced Package Exchange. It’s a Transport layer protocol that’s analogous to TCP. Unlike TCP/IP, IPX/SPX isn’t a standard protocol established by a standards group, such as IEE IPX/SPX is a proprietary standard developed and owned by Novell 32 Other Protocols 1. NetBIOS 2. AppleTalk 3. Short for Network Basic Input/output System This is the basic application-programming interface for network services on Windows computers. It’s installed automatically when you install TCP/IP Apple computers have their own suite of network protocols known as AppleTalk SNA Systems Network Architecture is an IBM networking architecture Designed primarily to support huge terminals such as airline reservation and banking systems, with tens of thousands of terminals attached to central host computers 33 Questions